Update for context and more information for I started this process, I used promiscuous mode on the en0 interface (wireless) on a macbook air. If this is the case, is there software to decrypt the data after it has been recorded? If I need the passphrase, I have it (given that this is my lab network). What settings am I missing, or do I need to decode the WPA2 passphrase to view the data? ![]() I am also able to see and capture 802.11 packets using monitor mode, but I cannot see their content. I have wireshark configured properly to capture on the wireless interface. I've seen this in action (ala firesheep) on a wired network. I'd like to demonstrate that unencrypted (non-HTTPS) network traffic on a wifi network can be viewed by other wireless devices. ![]() I'm attempting to replicate a 'wifi cafe' setup in a home lab environment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |